Published on March 10th 2026 | 13 mins , 2521 words
1. Explain the term procedural language as used in computer programming. (2mks)
A procedural language is a type of programming language that follows a step-by-step approach in executing instructions.
·It is based on procedures or functions, which are blocks of code that perform specific tasks.
2. A company allows employees to telework work at home and communicate with the office using internet.
(i) State three ways that a report could be sent to the office using the internet. (3mks)
- Email attachment
- Cloud storage (e.g., Google Drive, Dropbox)
- Instant messaging (e.g., WhatsApp, Slack, Microsoft Teams)
- Video conferencing screen sharing
- File Transfer Protocol (FTP)
- Online collaboration tools (e.g., Google Docs, Microsoft OneDrive)
(ii) Give two benefits to the company of using video conferencing. (2mks)
- Reduces travel costs
- Improves real-time collaboration
- Enhances communication efficiency
- Allows remote work flexibility
3. List two types of job opportunities that are available in the field of computer software. (2mks)
- Software developer
- System analyst
- Database administrator
- Network engineer
4. Describe three ways of deleting a line of text in Microsoft word document. (3mks)
- Use Shift + End, then press Delete.
- Select the line using a mouse and press Delete or Backspace.
- Place the cursor at the beginning of the line and press Backspace continuously.
5. Explain the holistic thinking with respect of system development. (2mks)
- Holistic thinking considers the entire system as a whole rather than focusing on individual parts.
- It ensures all components, including users, processes, hardware, and software, work efficiently together.
6. Give three features of good algorithm. (3mks)
- Finiteness – The algorithm must terminate after a finite number of steps.
- Definiteness – Each step should be precisely defined.
- Effectiveness – It should be simple and practical.
- Input/Output – It must have input values and produce output.
7. List three human features used in biometric systems installed in a computer to authenticate users. (3mks)
- Fingerprint
- Retina/Iris scan
- Facial recognition
- Voice recognition
8. Mention three ways in which human beings issue commands to computer. (3mks)
- Keyboard input
- Mouse clicks
- Touchscreen gestures
- Voice commands
- Joystick or game controllers
9. Give four file management tasks that would be carried out by an operating system. (4mks)
- Creating files
- Deleting files
- Renaming files
- Copying files
- Organizing files into folders
- Managing file permissions
10. What is input validation with regard to spreadsheet application. (2mks)
- It is the process of ensuring that only valid and meaningful data is entered into a spreadsheet.
- It involves setting constraints such as numerical limits, text formats, or required fields.
11. Explain three health challenges that workers may experience as a result of using ICT gadgets in an organization. (3mks)
- Eye strain
- Repetitive strain injury (RSI)
- Back pain
- Stress from prolonged screen exposure
- Hearing damage from loud audio devices
12. Identify two circumstances under which a system analyst may prefer to use automated methods to collect data instead of questionnaire, observation, interviews and book review. (2mks)
- When handling large data volumes
- When real-time data collection is required
- When high accuracy is needed
- When working in hazardous environments
13. Explain the following measures against unauthorized access: (2mks)
(a) Security Policy – A set of rules defining how an organization protects IT infrastructure.
(b) Security Monitor – A system that continuously checks for security breaches.
14. Briefly explain two types of logical topologies. (2mks)
Ethernet Network (Logical Bus, Physical Star)
o Physically, all devices are connected to a switch (star topology).
o Logically, data flows like a bus network (Ethernet broadcasts packets).
Token Ring (Logical Ring, Physical Star)
o Devices are physically connected in a star shape.
o Data travels in a ring-like pattern using a token.
15. What does gutter mean in relation to column setting in DTP. (2mks)
- The gutter is the extra space between columns to improve readability or allow for binding in printed materials.
SECTION B
16. a) State the three basic types of program control structures. (3mks)
Sequence – Instructions are executed one after another in the order they appear.
Selection (Decision-Making) – The program makes a choice based on a condition (e.g., IF-ELSE statements). Iteration (Looping) – A set of instructions is repeated until a condition is met (e.g., WHILE, FOR loops).
b) Define the following terms:
i) Hardware oriented (2mks)
Refers to software or programming languages that are designed to work closely with hardware components.
Example: Assembly language directly interacts with a computer’s CPU and memory.
ii) Translator (2mks)
A program that converts code from one programming language into another, typically from high-level to machine code.
Types include compilers, interpreters, and assemblers.
iii) Syntax error (2mks)
- An error that occurs when the program does not follow the grammatical rules of a programming language.
- Example: Missing a semicolon (;) in C programming.
c) Study the following flowchart diagram.
i) Indicate the purpose of the above flowchart. (1mk)
The flowchart is used to determine the highest and the lowest between A and B.
ii) Design a pseudocode for the flowchart above.(5mks)
BEGIN
PRINT "Enter the first number:"
INPUT num1
PRINT "Enter the second number:"
INPUT num2
IF num1 > num2 THEN
PRINT "The largest number is: ", num1
ELSE IF num2 > num1 THEN
PRINT "The largest number is: ", num2
ELSE
PRINT "Both numbers are equal."
ENDIF
END.
Explanation:
- The program prompts the user to input two numbers.
- It compares the two numbers using conditional statements (IF-ELSE).
- It prints the larger number or states that both are equal.
17. a) Study the table below and answer the questions that follow.
| | | | | | | |
| | A | B | C | D | E | F | G
| 1 | Product ID | Product Name | Received Quantity | Sold Quantity | Balance Stock | Unit Price | Total
| 2 | KW00012 | KDF | 1000 | 300 | 700 | 60 |
| 3 | KW00023 | Juice Kola | 200 | 150 | 50 | 50 |
| 4 | KW00045 | Gaddafi | 130 | 130 | 0 | 10 |
| 5 | KW00029 | Bread | 400 | 200 | 200 | 50 |
| 6 | Trade Discount | 10% | | | | |
| 7 | VAT | 16% | | | | |
(i) Write down the formula that
Calculate the balance stock (2mks)
- =C2 - D2
Calculate the total cost (2mks)
- =E2 * F2
(ii) Given that customers who purchased Juice Kola were allowed 10% trade discount write a formula that would be used to get the total cost. (2mks)
- = (F3 * D3) * (1 - 10%)
(iii) Value added Tax of 16% was imposed on Gaddafi write a formula for the new price. (2mks)
- =F4 * (1 + 16%)
b) Describe three hardware related factors that one need to consider before installing an operating system. (3mks)
Processor Speed – The CPU must meet the minimum requirements for the OS.
RAM Capacity – Sufficient memory is needed for smooth operation.
Storage Space – The hard drive or SSD must have enough free space for installation.
Graphics Capability – A compatible graphics card may be required for certain OS features.
Peripheral Compatibility – The OS should support existing printers, scanners, and other devices.
c) List three things that may cause malfunction in Microsoft Window Operating system environment (3mks)
Malware and Viruses – Can corrupt system files and slow down performance.
Corrupt System Files – Improper shutdowns or failed updates can lead to errors.
Hardware Failure – Faulty RAM, hard drives, or overheating can cause crashes.
Software Conflicts – Incompatible or poorly coded applications may lead to instability.
Driver Issues – Outdated or incompatible device drivers can cause system errors.
18.a) List two types of domain names given to institutions of learning. (2mks)
· .edu – Used by educational institutions worldwide.
· .ac (e.g., .ac.ke, .ac.uk, .ac.in) – Used by academic institutions in specific countries.
b) Explain the function of each button on the navigation toolbar of a web browser. (3mks)
(i) History – Displays a list of previously visited web pages.
(ii) Home – Navigates to the predefined homepage of the browser.
(iii) Download – Opens the download manager to show downloaded files.
c) Peter Kenneth bought a PC for his personal use at home. He wanted to do online writing at home to earn a living but there was no internet connectivity at home. Mention three internet connectivity requirements Peter Kenneth need to consider to get full internet connectivity. (3mks)
Internet Service Provider (ISP) subscription – To access internet services.
Networking hardware (e.g., router, modem, or mobile hotspot) – To establish internet connectivity.
Data plan or broadband connection – To provide internet access for online work.
d) Give three reasons to justify why companies like Alibaba, Kilimali, Jumia, Copia and Masoko prefer selling their products on e-commerce platform (3mks)
- Wider customer reach – Access to a global market.
- Reduced operational costs – No need for physical stores.
- 24/7 availability – Customers can shop anytime.
- Data-driven marketing – AI and analytics help personalize offers.
- Secure and convenient transactions – Online payment systems simplify purchases.
e) Describe two factors to consider when choosing a file organization method. (2mks)
- Speed of data access – How quickly data needs to be retrieved.
- Storage efficiency – Optimal use of storage space.
- Ease of updating records – Adding, modifying, and deleting records should be simple.
- Data integrity and security – Protection against loss and unauthorized access.
- Nature of application – Some methods suit specific data processing needs.
f) State two challenges facing electronic data processing modes in the current society. (2mks)
- Cybersecurity threats – Risk of hacking and data breaches.
- High initial cost – Expensive infrastructure and software.
- Data loss risks – System failures and accidental deletions.
- Technical expertise requirement – Skilled personnel needed for maintenance.
- Privacy concerns – Unauthorized access to personal data.
19. a) Enumerate four break-through in health care investigated by ICT (4mks)
- Telemedicine – Remote diagnosis and treatment through video calls and mobile apps.
- Electronic Health Records (EHRs) – Digital storage and retrieval of patient medical records.
- Robotic Surgery – Precision surgeries performed with robotic assistance.
- AI-powered Diagnostics – Machine learning algorithms assisting in disease detection and treatment planning.
b) Name four application areas of artificial Intelligence. (4mks)
- Healthcare (e.g., AI diagnostics, drug discovery)
- Finance (e.g., fraud detection, stock market analysis)
- Autonomous vehicles (e.g., self-driving cars)
- Customer service (e.g., chatbots, virtual assistants)
- Cybersecurity (e.g., threat detection)
- Manufacturing (e.g., predictive maintenance, quality control)
c) List three scanning devices available at electronic Point Sale Terminal. (3mks)
- Barcode scanner
- QR code scanner
- Magnetic stripe reader
- RFID (Radio Frequency Identification) scanner
d) Describe two ways of avoiding eavesdropping. . (2mks)
Using encryption – Encrypting communication to prevent unauthorized access.
· Using VPNs – Secure tunneling to hide internet traffic.
· Avoiding public Wi-Fi – Preventing exposure to unsecured networks.
· Using strong authentication methods – Implementing multi-factor authentication
e) System failure is considered as a threat to data security. Describe three measures an organization should put in place to guard against system failure. (3mks)
- Regular data backups – Ensuring critical data is stored safely.
- Using Uninterruptible Power Supply (UPS) – Protecting against power failures.
- Updating and patching software – Preventing vulnerabilities and security risks.
- Implementing redundancy – Having backup systems in case of hardware failure.
- Monitoring system performance – Identifying and addressing issues before failure occurs.
20.a) List two types of fields in a database use to create relationship between multiple tables. (2mks)
- Primary Key – A unique identifier in a table.
- Foreign Key – A field in one table that refers to the primary key of another table.
b) Describe three types of relationships used in a database to link multiple tables. (3mks)
- One-to-One (1:1) – Each record in Table A is related to only one record in Table B.
- One-to-Many (1:M) – One record in Table A can be linked to multiple records in Table B, but a record in Table B relates to only one in Table A.
- Many-to-Many (M:M) – Records in Table A can be related to multiple records in Table B and vice versa.
c) Describe the following field data types as used in Databases
i) Calculated Field (2mks)
· A field that derives its value from an expression or formula rather than being manually entered.
· Example: A field calculating Total_Price as Quantity * Unit_Price.
ii) Attachment Field (2mks)
· A field used to store files such as images, documents, or PDFs within a database.
· Example: Attaching a scanned copy of an ID to a customer record.
d) Name two power related problems usually affects the running of a computer in a lab. (2mks)
- Power surges – Sudden increases in voltage that can damage components.
- Blackouts – Total power loss that causes unsaved work to be lost.
- Brownouts – Low voltage levels that may cause instability in devices.
- Electromagnetic interference (EMI) – Disruptions caused by electrical noise affecting performance.
e) i) What is a toggle key? (1mk)
- A key that switches between two states, such as ON and OFF, when pressed.
ii) Give three examples of toggle keys. (3mks)
- Caps Lock
- Num Lock
- Scroll Lock
- Insert